期刊文献+
共找到194篇文章
< 1 2 10 >
每页显示 20 50 100
Preventing Hardware Trojans in Switch Chip Based on Payload Decoupling 被引量:1
1
作者 Ke Song Binghao Yan +2 位作者 Xiangyu Li Qinrang Liu Ling OuYang 《China Communications》 SCIE CSCD 2021年第8期96-108,共13页
Hardware Trojans in integrated circuit chips have the characteristics of being covert,destructive,and difficult to protect,which have seriously endangered the security of the chips themselves and the information syste... Hardware Trojans in integrated circuit chips have the characteristics of being covert,destructive,and difficult to protect,which have seriously endangered the security of the chips themselves and the information systems to which they belong.Existing solutions generally rely on passive detection techniques.In this paper,a hardware Trojans active defense mechanism is designed for network switching chips based on the principle of encryption algorithm.By encoding the data entering the chip,the argot hidden in the data cannot trigger the hardware Trojans that may exist in the chip,so that the chip can work normally even if it is implanted with a hardware Trojans.The proposed method is proved to be effective in preventing hardware Trojans with different trigger characteristics by simulation tests and practical tests on our secure switching chip. 展开更多
关键词 network switching chip active defense hardware trojan payload decoupling
在线阅读 下载PDF
特洁安技术公司 TrojanSwiftSC净水紫外消毒系统
2
《流程工业》 2011年第4期20-20,共1页
Trojan UVSwiftSC紫外消毒系统非常适合最高达44MGD(700m^3/hr)的小型流量应用.它的紧凑、坚固系统可以提供对地表水和地下水作为饮用水消毒有效而经济的解决方案。
关键词 消毒系统 紫外 技术 净水 TROJAN 饮用水消毒 地表水
在线阅读 下载PDF
2015年12月计算机病毒疫情分析 被引量:2
3
作者 张瑞 刘威 《信息网络安全》 2016年第2期74-74,共1页
1计算机病毒总体情况2015年12月,国家计算机病毒应急处理中心共发现病毒863,950个,比11月上升12.4%,新增病毒97,424个,比11月上升54.9%,感染计算机64,958,367台,比11月上升20.4%,主要传播途径仍以"网络钓鱼"和"网页挂马"为主。2计... 1计算机病毒总体情况2015年12月,国家计算机病毒应急处理中心共发现病毒863,950个,比11月上升12.4%,新增病毒97,424个,比11月上升54.9%,感染计算机64,958,367台,比11月上升20.4%,主要传播途径仍以"网络钓鱼"和"网页挂马"为主。2计算机病毒动态1)12月互联网上出现一种感染手机的"短信拦截"木马程序变种Android.SmsT hief.cc。 展开更多
关键词 木马程序 疫情分析 网页挂马 应急处理中心 网络钓鱼 社会工程学 TROJAN Android 后门程序 网络状态
在线阅读 下载PDF
An Evolutionary Algorithm for Non-Destructive Reverse Engineering of Integrated Circuits 被引量:1
4
作者 Huan Zhang Jiliu Zhou Xi Wu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第6期1151-1175,共25页
In hardware Trojan detection technology, destructive reverse engineering can restore an original integrated circuitwith the highest accuracy. However, this method has a much higher overhead in terms of time, effort, a... In hardware Trojan detection technology, destructive reverse engineering can restore an original integrated circuitwith the highest accuracy. However, this method has a much higher overhead in terms of time, effort, and cost thanbypass detection. This study proposes an algorithm, called mixed-feature gene expression programming, whichapplies non-destructive reverse engineering to the chip with bypass detection data. It aims to recover the originalintegrated circuit hardware, or else reveal the unknown circuit design in the chip. 展开更多
关键词 Hardware trojans Trojan detection mixed-feature gene expression programming
在线阅读 下载PDF
2016年3月计算机病毒疫情分析
5
作者 刘威 马天成 《信息网络安全》 2016年第5期85-85,共1页
1计算机病毒总体情况2016年3月,国家计算机病毒应急处理中心共发现病毒704,991个,比2月上升5.3%,新增病毒65932个,比2月上升60.0%,感染计算机50,583,205台,比2月上升20.6%,主要传播途径仍以"网络钓鱼"和"网页挂马"为主。
关键词 疫情分析 网页挂马 应急处理中心 网络钓鱼 木马程序 恶意程序 宏病毒 TROJAN 社会工程学 手机系统
在线阅读 下载PDF
2015年11月计算机病毒疫情分析
6
作者 张瑞 刘威 《信息网络安全》 2016年第1期94-94,共1页
1计算机病毒总体情况 2015年11月,国家计算机病毒应急处理中心共发现病毒768593个,比10月下降4.1%,新增病毒62885个,比10月下降30.5%,感染计算机53950372台,比10月下降1.9%,主要传播途径仍以"网络钓鱼"和"网页挂马"为主。
关键词 手机系统 疫情分析 网页挂马 应急处理中心 网络钓鱼 木马程序 TROJAN 病毒分类 后门程序 Android
在线阅读 下载PDF
2015年6月计算机病毒疫情分析
7
作者 李冬 孟彬 《信息网络安全》 2015年第8期82-82,共1页
1计算机病毒总体情况 2015年6月,国家计算机病毒应急处理中心共发现病毒548,629个,比5月下降9.8%,新增病毒71,167个,比5月下降23.4%,感染计算机40,957,659台,比5月上升3.0%,主要传播途径仍以"网络钓鱼"和"网页挂马"为主。2计算机... 1计算机病毒总体情况 2015年6月,国家计算机病毒应急处理中心共发现病毒548,629个,比5月下降9.8%,新增病毒71,167个,比5月下降23.4%,感染计算机40,957,659台,比5月上升3.0%,主要传播途径仍以"网络钓鱼"和"网页挂马"为主。2计算机病毒动态1)6月互联网上出现一种恶意后门程序变种Backdoor_Agent.ET。变种运行后会获取系统目录,打开病毒源文件,读取文件末尾字节的数据,并写入新创建的系统目录;获取Windows目录下的文件信息,修改并做伪装; 展开更多
关键词 疫情分析 网页挂马 应急处理中心 网络钓鱼 文件信息 后门程序 病毒源 病毒分类 恶意攻击者 TROJAN
在线阅读 下载PDF
苹果的安全之缺
8
作者 肖新光 《程序员》 2012年第6期17-17,共1页
OS X无疑是过去一段时间的安全焦点,这一切要从木马Trojan/OSX.Flashback说起。尽管这个病毒在2011年末就已经出现,但今年发现的新变种利用Java漏洞攻击,在4月上旬达到了感染数量的峰值——部分反病毒厂商监控到超过50万台主机被感... OS X无疑是过去一段时间的安全焦点,这一切要从木马Trojan/OSX.Flashback说起。尽管这个病毒在2011年末就已经出现,但今年发现的新变种利用Java漏洞攻击,在4月上旬达到了感染数量的峰值——部分反病毒厂商监控到超过50万台主机被感染。考虑到OS X只是第二大桌面系统,这已经是一个非常惊人的数字。 展开更多
关键词 安全 苹果 TROJAN 漏洞攻击 Java 桌面系统 反病毒 新变种
在线阅读 下载PDF
怎样把电脑病毒捉出来
9
作者 低烧小子 《电脑》 2001年第11期73-73,共1页
关键词 计算机 病毒 BOOT File/Macro trojans 工具软件 引导型
在线阅读 下载PDF
A Therapeutic Sheep in Metastatic Wolf’s Clothing: Trojan Horse Approach for Cancer Brain Metastases Treatment 被引量:3
10
作者 Hai-jun Liu Mingming Wang +2 位作者 Shanshan Shi Xiangxiang Hu Peisheng Xu 《Nano-Micro Letters》 SCIE EI CAS CSCD 2022年第7期140-156,共17页
Early-stage brain metastasis of breast cancer(BMBC), due to the existence of an intact blood–brain barrier(BBB), is one of the deadliest neurologic complications. To improve the efficacy of chemotherapy for BMBC, a T... Early-stage brain metastasis of breast cancer(BMBC), due to the existence of an intact blood–brain barrier(BBB), is one of the deadliest neurologic complications. To improve the efficacy of chemotherapy for BMBC, a Trojan horse strategy-based nanocarrier has been developed by integrating the cell membrane of a brain-homing cancer cell and a polymeric drug depot. With the camouflage of a MDA-MB-231/Br cell membrane, doxorubicin-loaded poly(D, L-lactic-co-glycolic acid) nanoparticle(DOX-PLGA@CM) shows enhanced cellular uptake and boosted killing potency for MDA-MB-231/Br cells. Furthermore, DOX-PLGA@CM is equipped with naturally selected molecules for BBB penetration, as evidenced by its boosted capacity in entering the brain of both healthy and early-stage BMBC mouse models. Consequently, DOX-PLGA@CM effectively reaches the metastatic tumor lesions in the brain, slows down cancer progression, reduces tumor burden, and extends the survival time for the BMBC animal.Furthermore, the simplicity and easy scale-up of the design opens a new window for the treatment of BMBC and other brain metastatic cancers. 展开更多
关键词 Trojan horse Brain metastasis Blood-brain barrier Cell membrane NANOMEDICINE
暂未订购
An Unknown Trojan Detection Method Based on Software Network Behavior 被引量:2
11
作者 LIANG Yu PENG Guojun +1 位作者 ZHANG Huanguo WANG Ying 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期369-376,共8页
Aiming at the difficulty of unknown Trojan detection in the APT flooding situation, an improved detecting method has been proposed. The basic idea of this method originates from advanced persistent threat (APT) atta... Aiming at the difficulty of unknown Trojan detection in the APT flooding situation, an improved detecting method has been proposed. The basic idea of this method originates from advanced persistent threat (APT) attack intents: besides dealing with damaging or destroying facilities, the more essential purpose of APT attacks is to gather confidential data from target hosts by planting Trojans. Inspired by this idea and some in-depth analyses on recently happened APT attacks, five typical communication characteristics are adopted to describe application’s network behavior, with which a fine-grained classifier based on Decision Tree and Na ve Bayes is modeled. Finally, with the training of supervised machine learning approaches, the classification detection method is implemented. Compared with general methods, this method is capable of enhancing the detection and awareness capability of unknown Trojans with less resource consumption. 展开更多
关键词 targeted attack unknown Trojan detection software network behavior machine learning
原文传递
2015年2月计算机病毒疫情分析
12
作者 赵晓明 孟彬 《信息网络安全》 2015年第4期90-90,共1页
1计算机病毒总体情况 2015年2月,国家计算机病毒应急处理中心共发现病毒576949个,比上月下降11.1%,新增病毒97583个,比上月下降16.4%,感染计算机41857639台,比上月下降11.2%,主要传播途径仍以"网络钓鱼"和"网页挂马"为主。具体情... 1计算机病毒总体情况 2015年2月,国家计算机病毒应急处理中心共发现病毒576949个,比上月下降11.1%,新增病毒97583个,比上月下降16.4%,感染计算机41857639台,比上月下降11.2%,主要传播途径仍以"网络钓鱼"和"网页挂马"为主。具体情况如图1、图2所示。 展开更多
关键词 疫情分析 网页挂马 应急处理中心 网络钓鱼 蠕虫程序 TROJAN 恶意攻击者 木马程序 弱口令 键值项
在线阅读 下载PDF
The synthesis and antibacterial activity evaluation of oxazolidinone-deferasirox conjugates 被引量:1
13
作者 Xintong Zhao Yuhua Hu +3 位作者 Tong Qin Tianlei Li Wenxuan Zhang Song Wu 《Journal of Chinese Pharmaceutical Sciences》 CAS CSCD 2022年第12期946-952,共7页
We reported herein the synthesis and antibacterial activity evaluation of two oxazolidinone-deferasirox conjugates with different linkers that were designed based on the“Trojan horse”strategy.The conjugates could co... We reported herein the synthesis and antibacterial activity evaluation of two oxazolidinone-deferasirox conjugates with different linkers that were designed based on the“Trojan horse”strategy.The conjugates could combine with Fe^(3+)ions as the deferasirox.However,both conjugates were inactive against tested bacteria,including S.aureus,E.coli,A.baumannii,and P.aeruginosa.The results suggested that the synthesized iron chelator deferasirox was not suitable as a siderophore of the bacteria to transport the antibiotic,or the coupling linker of the synthesized conjugates could not be hydrolyzed to release the oxazolidinone in the cytoplasm.Therefore,the design and synthesis of oxazolidinone-deferasirox conjugates need further exploration. 展开更多
关键词 OXAZOLIDINONE DEFERASIROX ANTIBACTERIAL SIDEROPHORE “Trojan horse”strategy
原文传递
Dynamic(2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication 被引量:1
14
作者 赖红 Orgun A.Mehmet +2 位作者 肖井华 Pieprzyk Josef 薛理银 《Communications in Theoretical Physics》 SCIE CAS CSCD 2015年第4期459-465,共7页
In this paper, we show that a(2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised... In this paper, we show that a(2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely. 展开更多
关键词 (2 3) threshold quantum state sharing RECURRENCE distributed fountain codes EFFICIENCY Trojan horse attacks
原文传递
Effects of Motivation and Demography on the Quantitative Plausibility of the Trojan Horse Defence Against Possession of Child Pornography 被引量:1
15
作者 Richard E Overill Jantje A M Silomon +1 位作者 Kam-Pui Chow Hayson Tse 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期9-15,共7页
The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hy... The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hypothetical Trojan Horse author to be included in quantifying the relative plausibility of competing explanations for the existence of uncontested digital evidence.This new model has been applied to the case of the Trojan Horse defence( THD) against the possession of child pornography.Our results demonstrate that the THD in this case cannot be plausibly sustained unless it can be shown that an ‘off-theshelf'( OTS) Trojan Horse for this task is available and it is not detectable by the target computer,at the material time. 展开更多
关键词 Trojan Horse defence child pornography digital forensic evidence complexity quantitative plausibility metrics posterior odds
在线阅读 下载PDF
A Hardware Trojan Detection Method Based on the Electromagnetic Leakage 被引量:1
16
作者 Lei Zhang Youheng Dong +2 位作者 Jianxin Wang Chaoen Xiao Ding Ding 《China Communications》 SCIE CSCD 2019年第12期100-110,共11页
Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficu... Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficult to detecte due to its minimal resource occupation. In order to achieve an accurate detection with high efficiency, a HT detection method based on the electromagnetic leakage of the chip is proposed in this paper. At first, the dimensionality reduction and the feature extraction of the electromagnetic leakage signals in each group(template chip, Trojan-free chip and target chip) were realized by principal component analysis(PCA). Then, the Mahalanobis distances between the template group and the other groups were calculated. Finally, the differences between the Mahalanobis distances and the threshold were compared to determine whether the HT had been implanted into the target chip. In addition, the concept of the HT Detection Quality(HTDQ) was proposed to analyze and compare the performance of different detection methods. Our experiment results indicate that the accuracy of this detection method is 91.93%, and the time consumption is 0.042s in average, which shows a high HTDQ compared with three other methods. 展开更多
关键词 hardware trojan detection side channel analysis electromagnetic leakage principal component analysis Mahalanobis distance detection quality
在线阅读 下载PDF
2008年互联网主要安全趋势及未来展望 被引量:1
17
《信息网络安全》 2009年第1期38-38,共1页
2008年互联网主要安全趋势 1.新型恶意软件变种与威胁种群 攻击者过去主要针对少数几种威胁进行大量传播,然而现在则是采用多种类威胁种群进行微型传播以达到目的:恶意软件的这些新变化是由于数百万不同的威胁在快速散播的过程中... 2008年互联网主要安全趋势 1.新型恶意软件变种与威胁种群 攻击者过去主要针对少数几种威胁进行大量传播,然而现在则是采用多种类威胁种群进行微型传播以达到目的:恶意软件的这些新变化是由于数百万不同的威胁在快速散播的过程中不断变异而造成的。2007年7月首次发现的Trojan.Farfli便是这弹一种威胁种群,具备以上所述特征。 展开更多
关键词 互联网 安全 展望 TROJAN 恶意软件 威胁 种群 攻击者
在线阅读 下载PDF
2016年1月计算机病毒疫情分析
18
作者 张韫菁 刘威 《信息网络安全》 2016年第3期84-84,共1页
1计算机病毒总体情况2016年1月,国家计算机病毒应急处理中心共发现病毒884,729个,比上月上升2.4%,新增病毒70,288个,比上月下降27.9%,感染计算机50,837,294台,比上月下降21.7%,主要传播途径仍以"网络钓鱼"和"网页挂马"为主。
关键词 疫情分析 网页挂马 应急处理中心 网络钓鱼 木马程序 手机系统 TROJAN 恶意攻击者 网络状态 系统应用程序
在线阅读 下载PDF
2015年5月计算机病毒疫情分析
19
作者 冯军亮 孟彬 《信息网络安全》 2015年第7期90-90,共1页
1计算机病毒总体情况2015年5月,国家计算机病毒应急处理中心共发现病毒608,467个,比4月下降1.8%,新增病毒92,963个,比4月下降16.7%,感染计算机39,775,038台,比4月下降4.4%,主要传播途径仍以"网络钓鱼"和"网页挂马"为主。图1 5月我... 1计算机病毒总体情况2015年5月,国家计算机病毒应急处理中心共发现病毒608,467个,比4月下降1.8%,新增病毒92,963个,比4月下降16.7%,感染计算机39,775,038台,比4月下降4.4%,主要传播途径仍以"网络钓鱼"和"网页挂马"为主。图1 5月我国新增计算机病毒态势图2 5月我国新增计算机病毒分类2计算机病毒动态1)5月互联网上出现一种恶意木马程序变种Trojan_Agent.QIO,通过网页挂马或文件恶意捆绑的方式进行传播。该变种运行后,先遍历受感染操作系统的所有磁盘分区,设置autorun.inf文件,获取操作系统所在目录。 展开更多
关键词 网页挂马 应急处理中心 网络钓鱼 磁盘分区 TROJAN 木马程序 系统内存 恶意程序 疫情分析 态势图
在线阅读 下载PDF
木马程序与系统安全 被引量:2
20
作者 汤沛 冯炳灿 《河南机电高等专科学校学报》 CAS 2005年第1期45-47,共3页
主要探讨了计算机学科中特洛伊木马程序的基本定义、形式分类及对系统可能造成的危害,同时分析了在多用户系统平台中检测木马程序的方法和所使用的技术,最后预测了将来的木马程序的发展趋势。
关键词 特洛伊木马(Trojan Horse) RFC 目标一致性 恶意代码 数字签名
在线阅读 下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部